Siri makes a fantastic personal assistant. She can help you navigate your phone, manage your calendar, answer your questions, and can even tell a great bedtime story if you ask her nicely. She’s become so helpful, hackers now say she’ll roll out the welcome mat for anyone under the right circumstances. The Network and Information Security Agency (ANSSI) from France uncovered this nasty little glitch, and they’ve proven that Siri will respond to silent commands from anyone within a 16-foot radius.

Hackers Can Send Siri Messages via Electromagnetic Waves

It requires a bit of finesse to pull the trick off, but researchers (aka professional hackers working for the French government), have discovered a way to silently talk to iOS and Android digital assistants. It turns out that headphones with an integrated microphone work as an antenna can pull in electromagnetic waves, which are then converted into electrical signals that the digital assistant recognizes as sound. Quite simply, standard Apple earbuds plugged into your iPhone, are all a hacker needs to send silent voice commands to your phone.

Once Inside, Hackers Can Do Just About Anything

In all fairness, it’s easy to see the hackers in action, just by watching your screen. However, many of us stash our phones in briefcases during meetings, or place the device upside down on a table during a discussion. In a public place, such as a restaurant, or even a courtroom, hackers can easily search for available mobile devices to connect with. Dozens of people in any given space could be vulnerable to attack. Hackers can gain access to contact lists, send texts, make calls, compose emails, or even open up websites with malicious codes and viruses. Realistically, anything that can be done using the digital assistant can be done by hackers, in total silence, from as much as 16 feet away.

The Equipment Needed Can Be Discreetly Hidden

Last summer, the research was presented at the Hack in Paris conference, though it received almost no press. Very little equipment is needed for hackers to pull the trick off, and it can be discreetly concealed. This makes it difficult to tell who the culprit is, even if you detect that your phone is being hacked while someone is actively accessing it just a few feet away. A laptop with GNU Radio, an open-source software, and a USRP software-defined radio, combined with an antenna and amplifier, are all that’s needed to access someone’s phone. If the hackers can get within 16 feet of you, the equipment can fit inside a backpack. However, researchers have noted that the distance can be much greater with an equipment upgrade. Though it would be more difficult to obscure, it’s plausible that hackers could sit in a vehicle outside a restaurant or other venue, prying into the phones of diners.

Apple has Been Notified, But there’s No Fix Yet

Researchers notified Apple and Google, and also gave the companies suggestions on ways to correct defect. They recommended better shielding within headphones, or perhaps software upgrades with the option for people to create customized code words to wake digital assistants. Voice recognition could also thwart would-be hackers. While the obvious temporary fix seems to be to turn off the digital assistant when not in use, researchers noted that many headphones have a button that turns the service back on. This, too, could be easily manipulated with electrical pulses. Until the companies respond with a real repair, the only way to protect phones and their data is to remove the headphones from the jack when they’re not being used.

It was only a few weeks ago that another Siri exploit was detected. Anyone could access the contacts and photos on an Apple device by waking Siri up after a few incorrect passcode attempts, using the clock app, and sharing. From the messaging app, the contacts could be searched, or a photo could be shared, allowing anyone free access to view all the stored photos in less than 30 seconds. When Apple heard about this, they corrected it right away, so iPhones, iPods, and iPads running iOS 9.0.1 are safe. However, the number of vulnerabilities being seen in digital assistants is cause for concern. For now, the safest thing might be to go sans headphones, and turn these helpful assistants off, to stop them from being helpful to hackers.

About the Author: Robert Widner is a family law attorney based out of Dallas Texas with over 16 years experience.

Most attorneys will have heard of at least a few of these solutions as they have been the main contenders for decades. The problem is that they have turned into massive and immobile pieces of bloatware. What is bloatware? From wikipedia: “In long-lived software, perceived bloat can occur from the software servicing a large, diverse marketplace with many differing requirements. Most end users will feel they only need some limited subset of the available functions and will regard the others as unnecessary bloat, even if people with different requirements do use them.”

The problem with adding on every feature request for 5, 10, 15 years or more is that features, when you are not able to easily access them, become worthless. The software becomes so intimidating and non-inviting to the user that it simply goes unused. You see, if you and your staff are not both comfortable and confident with a solution, it is not going to be used.

I know many firms who had been using TABS3, PracticeMaster or PCLaw. However, they continued to track time on an excel sheet, which they would then send to their Office Manager once a week to manually enter. I have also heard from clients, who are making the switch from PC to Mac, that although they own one of these archaic pieces of bloatware, they rarely use them, if at all.

Another very common problem I see for these massive companies, especially those that have been around forever, is that they are very slow in moving to the cloud. If they do decide to move, they simply copy what they currently have, add a new pretty coat of paint and then offer it to their clientele. The problem here is that none of the weight is shed. This causes the migration to the cloud to be both slow and unexciting.

The Cloud

The new cloud-based management solutions have made gigantic strides in reinventing the software to what it should have been in the first place. They are lean, simple to use, easy to deploy and have great educational content to help the new users ease into it.

The older big name management solutions mentioned above often cost thousands of dollars to get up and running, thousands of dollars to maintain, and require expensive servers on-site, which in turn create expensive IT bills to properly manage and keep up to date. The new cloud-based solutions are turn-key, without massive initial fees to get up and running. They can easily scale and contract with the needs of your firm, making the process very easy to budget, since you will also know exactly what a new user will cost to add on. They also offer may ways to learn the software, so that when you bring on a new attorney, they can learn though self-paced methods such as pre-recorded videos on specific topics, live webinars, and easy to search and use online support portals. In comparison, most of the older software will have a 300 page PDF manual, which no one ever cracks into.

One of the biggest features is that ‘modern’, reinvented solutions also can integrate with many of the solutions your firm currently uses. Services like File sharing, like ShareFile, Dropbox for Business, Box, Quickbooks Online, Xero (accounting software), payment gateways, and more can seamlessly integrate and talk with these case management software solutions. These integrations will make working easier for your staff and will remove many of the tedious steps that are currently being manually performed by someone in your office.

If you feel your firm is currently using one of these ‘bloatware’ case management systems, I highly recommend taking a look at Clio and Rocket Matter. These are the two most popular ‘modern’ case management systems that our firm implements for our clients. The easier the interface of your case management solution is, the easier it will be for your staff to begin using it. The more they use it, the more productive they will be. And, whammy! You’ve just increased the profitability of your firm.

Provided as an educational service by Tom Lambotte, President of GlobalMac IT

GlobalMac IT was founded by Tom Lambotte – renowned nationwide as an author, speaker, trusted IT advisor, and cutting edge, successful provider of the #1 complete end-to-end IT solution for Mac-Based Law Firms in the world. Private firms from throughout North America – and as far reaching as American Samoa – running with a staff of 5-50 – have relied on his expertise to help them put their IT headaches behind once and for all.

Using his real world experience, where results rule and dollars can’t be wasted on negligent computer consultants, he wanted to help managing partners and office managers of Mac-based law firms to put an end to wasting their time and money on IT support that does not work and rescue them from the frustration.

Our unique “TotalCare” approach integrates classic IT support with proven proactive support that truly converts IT from something to be dealt with, into a tool that truly increases law firm profits, increases staff productivity, and provides piece of mind that firm and client data is secure and that their security is never at risk. You can reach GlobalMac IT at (440) 941-1622 to request more information.

Are you an attorney that uses Macs, or would you like to be one? Ether way, you’re in luck. MILOfest is a legal technology conference for Mac-using lawyers, and it offers practical and substantive tips on Macs, iPhones, and iPads. It will be held this year from November 12-14, 2015 at the Disney’s Yacht Club Resort in Orlando, FL.

I am honored to be part of this year’s faculty, along with numerous other Mac illuminati. If you have been debating whether to attend (hint: do it!), you’re invited to attend a free Executive Teleseminar on Monday, September 21st, 2015, which will discuss:

How MILOfest can keep you up to date on the latest tips and how to use Macs in your law office, for only a few billable hours

The risks of falling behind technologically – and why MILOfest is the single best conference that experts both attend and contribute to so they can ensure this does not happen to them

How to leverage technology to reduce bottlenecks in your firm and increase productivity; making a measurable financial impact on your profits

The #1 business reason why the most well known and respected Mac-using attorneys come back to MILOfest, year after year

Why running a firm on Macs without leveraging the best tools available gives you a false sense of IT productivity

Join Victor Medina, Mark Metzger, and me on Monday at 1:00pm (eastern) for this free Executive Teleseminar to learn more about MILOfest 2015. Click hereto register or get more information.

Did you know that fake iPhones are a growing problem? 40,000 counterfeit iPhones were recently seized in China, and people have been caught selling them in Maryland and California. Counterfeit consumer electronics were the second-most-seized commodity in 2013 and 2014, with an estimated retail price of approximately $150 million – and those are just the ones that were caught!

Do you know how to spot a fake iPhone? It’s not as easy as you might think, and to make it worse they come in two varieties: Frankenphones, which contain real Apple parts and run iOS but were assembled from smuggled or recycled phones, and Android phones that are disguised and passed off as iPhones. The following tips may help you detect the fakes and protect yourself and your wallet:

Frankenphones may look legit, but their software will probably seem sluggish, because their motherboards are from older models;

The IMEI numbers on Frankenphones probably won’t match. The number engraved in tiny print just under the logo on the back of an iPhone 6 should always match the one found at Settings > General > About.

To detect an Android in disguise, try to invoke Siri by pressing the Home button. If she doesn’t answer, you’ve got a problem.

You can also look at the icons to help determine if it’s an Android. For instance, if a Google Play app is visible or if the App Store doesn’t go to Apple’s App Store, it’s not an iPhone.

You can also detect an Android by copying the serial number in Settings (just above the IMEI described above) and pasting it in Apple’s online warranty checker. Unless the information matches, you’ve got a problem.

The article linked below contains some additional warning signs, and you should check it out before you decide to make a purchase. When all else fails, remember the old adage that if something sounds too good to be true, it probably is.

The following Guest Post is provided as an educational service by Tom Lambotte, President of GlobalMacIT:

The senior partner of a firm had just called our emergency line and told us his laptop and iPhone were stolen just minutes ago from a small café in Paris, France (not to be confused with Paris, TX). I couldn’t help slightly grinning, knowing all of his client data was both completely secure and backed up, thanks to the tools and best practices we had in place, and having complete certainty that he would be fully operational and back to work within a few minutes. Rare moments like these, where we get to use the full capability of our tools, makes everyone on our team feel a bit like 007.

We had him enroll his wife’s iPhone into our Mobile Device Management solution, and tapped into the magical powers of our IT solutions with the click of a few buttons on our end. POW! Within less than 5 minutes, our client had full access to his email, contacts, calendars, case management system and firm files. The work he had been working on minutes before the event, were all backed up and he picked up right where he left off. Best of all, this was all accomplished with very little effort on our end and done in a calm and collected manner. This last part is key, as we know what it’s like to receive stressed out, unconfident support on the other end of the line. This allowed our client to remain calm and comfortable through the process, as we put our tools to use from the other side of the globe. He went back to work and enjoyed the rest of his work-ation; our clients’ trip was shaken a bit, but not stirred.

Disasters happen. Unplanned events. “Acts of God.” This is why we carry at least half a dozen types of insurance. We do so to have peace of mind and certainty in times of chaos. You see, when something happens, your reaction should be calm and collected, “Well, that sucks, but I have a plan for this in place.” For example, if you lost your phone or dropped your laptop, what would happen? Well, there’s the financial hit of the loss of hardware, but the data you’ve most recently worked on is, in most cases, irreplaceable. In addition, the risk of a data breach is not to be taken lightly. When you’ve got the right IT Best Practices, support and solutions in place, your response should be something like this: “Oh snap, I lost the hardware, but the “stuff” is secure, backed up AND I have solutions in place to get back up and running with minimal effort.”

In this scenario GlobalMac IT was able to save the day. We calmly and confidently explained to our client that:

All of his firm and client data on his laptop and iPhone was completely secure and there was zero risk of a data breach.

Everything he had been working on all the way up to the fateful restroom break was backed up to our cloud file system and backup solution.

He would be back up and running in a matter of minutes.

The role of IT insurance in most small to medium law firms is often not taken seriously enough; for example, we see far too many firms using one of Amazon’s most highly rated and inexpensive, residential router or an Apple Extreme Base Station, to protect their firm’s network. We commonly see people doing their own IT or receiving support from their neighbor’s son living at home. You cannot expect someone whom you pay hourly and only in dire situations to implement pro-active solutions. Everyone has come across a legal case in which had they called you 6 months earlier, their case would have been much easier to take on and win. It’s the exact same with IT.

I challenge you to question the role of IT in your firm and how it is currently being approached. Is it a reactive model? Ignore-it-and-hope-everything-is-fine-model? “If it ain’t broke, don’t fix it” model? – (with 7 year old XP machines that are both a security risk and a massive loss leader in productivity in your firm). If you had been the one traveling in Paris and had your laptop and iPhone stolen with all your firm data on it, how would you have reacted and how quickly would you have been back up and running? James Bond did not make or guess which tools he would need on his missions, Q always provided them ahead of time.

Tom Lambotte is the CEO of GlobalMacIT, the only company in the world that specializes in providing IT support to Mac-based law firms. His methods are based on close to a decade of research, testing and real-world refinement of Best Practices, working directly with Mac-based law firms and firms switching from PC to Mac, across the country and around the world. Tom is the author of Hassle Free Mac IT Support for Law Firms and a highly sought after speaker at national events such as the ABA Techshow and MILOfest, a Mac Lovin’ Lawyers Event. Learn more about Tom and GlobalMac IT at www.globalmacit.com. GlobalMac IT, 95 Executive Pkwy, Suite 700, Hudson, OH 44236, 440-941-1622

I am always in search for the “ideal” keyboard/case for my iPad. Since its debut, I used my iPad as an extension of my computer (more on that in an upcoming post), rather than a media consumer. So for the past few months, I have been testing different keyboard/cases and look forward to testing a few others (and welcome any suggestions). Below is my review of the BrydgeAir iPad keyboard case.

Why a keyboard/case?

Before we dive into the review of the BrydgeAir, consider that my review comes from the stand-point stated above: I use my iPad as an extension of my computer, rather than a media consumer.

I know others feel differently; and, sure, there are things that an iPad cannot do as well as a computer. But, for what I do (e.g., word-processing; creating and presenting Keynote presentation; answering and drafting email; reviewing and annotating PDFs; and as a tool for litigation) the iPad is an ideal a computer replacement; nonetheless, I will admit there are times when a computer is the better tool.

For example, my iPad always goes with me to Court as both a case file and note-taking tool. This allows me to have access to all the documents in my file; my research and preferred research service; the internet; and a word processor for note taking. As so as I leave the courtroom, my notes are sent to the case file, while I begin drafting an Order or other necessary document through the built-in dictation. There is no other tool that offers this kind of productivity (yes, you could use your smartphone, but given its size that does not seem a practical alternative).

If you work requires more “heavy-lifting,” then the iPad may not provide the same utility. But, I think if your iPad is properly set-up and you do not expect it to function exactly like your computer the possibilities are exponential, especially considering the features of iOS 9 (see Ben’s post about the new features here). More on this later; for now, let us turn our attention to the BrydgeAir.

The BrydgeAir

Having taken the BrydgeAir with me to the courthouse a few times, used it to draft several documents (including this blog post), conduct research, and other various activities, I am very pleased with its performance. Overall, I rate the BrydgeAir a 4 out of 5. “As-is” it is a top-notch choice that I will likely continue to use; but with a few adjustments I believe the BrydgeAir could be an outstanding keyboard case.

Pros:

Easy pairing: Pairing the keyboard with your iPad is very easy (the keyboard uses a series of “beeps” to let you know the two devices are paired). The keyboard also works quite well; but I think a few adjustments (as illustrated below) it could be made better.

Aluminum body: The BrydgeAir is made from a single-piece of high grade aluminum. This feature alone makes it stand above other keyboard/cases I have tested so far. Once the iPad is placed in the hinges, there is no question of it falling out. Also from a cosmetic stand-point, it compliments the iPad quite nicely.

Backlight keys: Although, most of the places I use my iPad are well-light, I am sure this feature will be handy at the right time.

Built-in Speakers: The BrydgeAir also incorporates a set of bluetooth speakers, which have great sound quality (just like with the pairing of the keyboard, there is a series of “beeps” letting you know the devices are paired); which is a very useful feature.

Exceptional battery life.

Cons:

Cost: The $169.00 price is at the higher-end for keyboard/cases.

180 Degree Hinge: While the BrydgeAir allows for you to fold it “flat,” it would be outstanding if the hinges allowed the keyboard completely fold over (like a book). Additionally, when the hinges are laid out 180 degrees, the iPad does not sit flush.

Lack of a “fn” Key: In the place of the “fn” key is a key to activate Siri, which has led my muscle memory to create some awkward Siri outbursts. I would prefer to have the “fn” key in its normal location and for the key to activate Siri on the top key row (above the number keys).

Lack of a iOS Multitasking Key: The way I use my iPad, the iOS multitasking key is an important feature, as it allows me to access. Like the hinge, if the BrydgeAir keyboard case incorporated this feature, there is no question it would be keyboard of choice.

The keys could be a little more responsive and require a little less travel.

Removing the iPad: The same safety and security that comes from the hinges also makes it difficult to remove the iPad. Since the hinges only fold so far and prevent the iPad from sitting flush, it would be great if removal of the iPad were not such a hassle.

Noise: The keyboard can be a little noisy (or it could just be my typing style), but I have yet to receive any complaints from a Judge or Court Reporter (thankfully).

Every year, legal publisher Fastcase publishes the company’s annual list of “Fastcase 50” Award winners. Each year, this list recognizes 50 of “the smartest, most courageous innovators, techies, visionaries and leaders in the law.” The Stevens Firm is thrilled to announce that our Senior Partner, Ben Stevens, was chosen as a member of the Fastcase 50 Class of 2015. In presenting this award, Fastcase cited “Ben’s acumen in the Apple ecosystem has made him a sought-after speaker nationwide, and his blog is a definitive resource for the growing number of lawyers using Apple products in their law offices.”

While Ben may be known to lawyers in Spartanburg, SC as the founding member of a successful family law practice specializing in complex cases, Fastcase pointed out that “to the rest of the world, Ben is The Mac Lawyer. Not ‘a’ Mac lawyer. Capital T, capital M, capital L: The Mac Lawyer.” Ben has become a popular nationwide speaker at both family law and legal technology conferences, and he always finds a way to educate his audiences of the latest and greatest uses for building successful legal careers by implementing Mac and Apple devices into their practices at every level.

Ben was chosen for his courageous and innovative reinventing of his family law firm in 2005, long before it was cool to do so, by ditching the PC platform entirely and moving his entire law practice to Mac-based systems, computers, and devices.Further, to both document his process and to create an online reference point for lawyers who wanted to follow in his footsteps, he created The Mac Lawyer blog in 2006, and it has remained one of the top, go-to legal technology blogs ever since.

Fastcase received a record number of nominees this year, and Ben is proud to be included the recipients chosen for this tremendous honor. When notified of this honor, Ben said “Since its inception, the ‘Fastcase 50’ has been widely regarded as the ‘Who’s Who’ of legal technology illuminati. To even be mentioned in the same sentence as the current and past recipients is an honor that is difficult to put into words. It includes friends, colleagues, and many others whom I have admired for years. I sincerely appreciate Fastcase including me amongst such an esteemed group.”

If you’re in the market for buying a Mac, whether to make the switch from PCs or to upgrade an existing one, you may be wondering which Mac should you buy? Fear not, as Macworld recently published an article to help you choose the right Mac for you. This guide provides an overview of all the models currently available, what each model is best suited for, and a full in-depth review of each for those who want to know more.

I believe that attorneys can never learn too much about ethics, technology, or the intersection of the two. If you follow this subject closely, you will know that there is not a consensus of opinion when it comes to topics like Dropbox, Evernote, iCloud, Facebook, email, smartphones, and iPads.

Philippe Doyle Gray, a Barrister in New South Wales, Australia, and frequent speaker at the ABA TECHSHOW, has written a paper, “The Pillars of Digital Security“, which he says synthesizes disparate sources from around the world into a statement of principles that reflect an international consensus amongst lawyers and computer scientists about fundamental safeguards for lawyers’ use of technology.

Philippe’s paper provides a vocabulary for lawyers who know little about technology, and it aims to provide a universal approach to issues of ethics and malpractice, regardless of the operating system, device, or particular technology. His formulation links (1) key terms of the American Bar Association’s model rules of professional conduct, (2) the way in which computing devices work, and (3) the way in which lawyers practice their profession.

You can read more about Philippe’s thought on this subject in his article and/or download his paper here. Thanks to Philippe for his work in writing this paper, alerting me to it, and allowing me to share it with my readers.